Experience with the KeyNote trust management system: Applications and future directions

57Citations
Citations of this article
39Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Access control in distributed systems has been an area of intense research in recent years. One promising approach has been that of trust management, whereby authentication and authorization decisions are combined in a unified framework for evaluating security policies and credentials. In this paper, we report on our experience of the past seven years using the PolicyMaker and the KeyNote trust management systems in a variety of projects. We start with a brief overview of trust management in general, and KeyNote in particular; we describe several applications of trust management; we then discuss various features we found missing from our initial version of KeyNote, which would have been useful in the various applications it was used. We conclude the paper with our plans for future research. © Springer-Verlag Berlin Heidelberg 2003.

Cite

CITATION STYLE

APA

Blaze, M., Ioannidis, J., & Keromytis, A. D. (2003). Experience with the KeyNote trust management system: Applications and future directions. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2692, 284–300. https://doi.org/10.1007/3-540-44875-6_21

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free